333
Views
15
CrossRef citations to date
0
Altmetric
Articles

A Model of Information Security Awareness for Assessing Information Security Risk for Emerging Technologies

&

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (5)

Morgan M. Shepherd & Roberto J. Mejias. (2016) Nontechnical Deterrence Effects of Mild and Severe Internet Use Policy Reminders in Reducing Employee Internet Abuse. International Journal of Human–Computer Interaction 32:7, pages 557-567.
Read now
Aakanksha Tewari, A. K. Jain & B. B. Gupta. (2016) Recent survey of various defense mechanisms against phishing attacks. Journal of Information Privacy and Security 12:1, pages 3-13.
Read now
Richard G. Taylor. (2015) Potential Problems with Information Security Risk Assessments. Information Security Journal: A Global Perspective 24:4-6, pages 177-184.
Read now
Hongbo Lyu & Zuopeng (Justin) Zhang. (2015) Job Quitters, Information Security Awareness, and Knowledge Management Strategies. Journal of Information Privacy and Security 11:4, pages 189-210.
Read now
Wu He & Xiaohong Yuan. (2014) Guest Editorial. Journal of Information Privacy and Security 10:4, pages 157-159.
Read now

Articles from other publishers (10)

Chrispus Zacharia Oroni & Fu Xianping. (2023) Structural evaluation of management capability and the mediation role of cybersecurity awareness towards enterprise performance. Journal of Data, Information and Management.
Crossref
Malik Al-Shamli, Khalfan Zahran Al Hijji & Abdul Khalique Shaikh. (2022) Information Security Awareness practices: Omani Government Agencies as a case study. Education and Information Technologies 28:7, pages 8571-8605.
Crossref
Pranjal Upadhyay, Krishna Kumar Sharma, Rishu Dwivedi & Pradeep Jha. (2023) A Statistical Machine Learning Approach to Optimize Workload in Cloud Data Centre. A Statistical Machine Learning Approach to Optimize Workload in Cloud Data Centre.
Norshima Humaidi & Saif Hussein Abdallah Alghazo. (2022) Procedural Information Security Countermeasure Awareness and Cybersecurity Protection Motivation in Enhancing Employee’s Cybersecurity Protective Behaviour. Procedural Information Security Countermeasure Awareness and Cybersecurity Protection Motivation in Enhancing Employee’s Cybersecurity Protective Behaviour.
Meltem Mutluturk, Burcu Kor & Bilgin Metin. 2022. Research Anthology on Edge Computing Protocols, Applications, and Integration. Research Anthology on Edge Computing Protocols, Applications, and Integration 468 479 .
Himanshu Arora, Tanuj Manglani, Geetanjli Bakshi & Shikha Choudhary. (2022) Cyber Security Challenges and Trends on Recent Technologies. Cyber Security Challenges and Trends on Recent Technologies.
Meltem Mutluturk, Burcu Kor & Bilgin Metin. 2021. Handbook of Research on Information and Records Management in the Fourth Industrial Revolution. Handbook of Research on Information and Records Management in the Fourth Industrial Revolution 211 222 .
S. Raschid Muller & Mary L. Lind. (2020) Factors in Information Assurance Professionals' Intentions to Adhere to Information Security Policies. International Journal of Systems and Software Security and Protection 11:1, pages 17-32.
Crossref
Diane Dolezel & Alexander McLeod. (2019) Managing Security Risk. The Health Care Manager 38:4, pages 322-330.
Crossref
Anandharaman Pattabiraman, Sridhar Srinivasan, Kaushik Swaminathan & Manish Gupta. 2018. Information Technology Risk Management and Compliance in Modern Organizations. Information Technology Risk Management and Compliance in Modern Organizations 142 175 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.